Publication

Publisher:
 Journal Of Internet Technology And Secured Transactions (JITST) UK, 4(1):351-357.
Publication Type:
 Journal
Publication Title:
 Post-Quantum Crystography Based Security Framework For Cloud Computing
Publication Authors:
 6. Gabriel J. A., Alese B. K., Adetunmbi A. O. And Adewale O. S.
Year Published:
 2015
Abstract:

Cryptography, which is the combination of Cryptography and Steganography could be a suitable “tool” for enhancing the security of communications and/or computations over the cloud. Most existing Crystographic systems are based on Public key Cryptographic schemes like RSA and Elliptic Curve Cryptography (ECC), whose security depends on the difficulty of solving Integer Factorisation Problem (IFP) and Discrete Logarithm problem (DLP) respectively. However, techniques for solving IFP and DLP problems, improves continually. Therefore, the existence of Quantum Computers in the range of 1000 bits would be a real world threat to systems based on those problems. This paper thus propose a new Crystographic System that combines Post Quantum Cryptography with Steganography to ensure that security of cloud communication is maintained both in Classical Computing era as well as Post-Quantum Computing era.

 

Publisher:
 Journal Of Internet Technology And Secured Transactions (JITST) UK, 4(1):351-357.
Publication Type:
 Journal
Publication Title:
 Neural Network-Based Health Personnel Monitoring System”. African Journal Of Computing & ICT
Publication Authors:
 G. B. Iwasokun, O. S. Egwuche, And Gabriel J. A.,
Year Published:
 2015
Abstract:

Problems of the conventional health personnel management system include poor monitoring and evaluation. The system also suffers inadequate record-keeping, delayed personnel data aggregation and poor talent and file management. In this research, a neural network-based health personnel monitoring and management system is proposed as a solution to these problems. The system is based on a set of services and clients responsible for data management and has application and database servers as major components. The application servers hold and update the administrator’s settings as well as provide the interaction media. The database server contains all the system datasets and provides mechanism for standard and secured data access. The simulation model, theoretical framework and user interface were implemented using Java programming language. The adequacy and suitability of the proposed system were investigated based on case study of on-duty data obtained from selected health personnel at the Health Centre, Federal University of Technology, Akure (FUTA), Nigeria. Obtained results presented the new system as a good health personnel monitoring and management platform

 

Publisher:
 Anale. Seria Informatic?. Vol. XIII Fasc. 2 – 2015 Annals. Computer Science Series, University Of Timisoara, Romania. 13(2):65-68.
Publication Type:
 Journal
Publication Title:
 Modelling The Employees’ Activities Of Public Service Sector Using Production Rules
Publication Authors:
 8. Gabriel J. A., Egwuche S. O.
Year Published:
 2015
Abstract:

In every organization, effective Human Resource Management (HRM) is vital in order to meet the increasing market demands with well-qualified employees at all times. The research is aimed at providing personnel activity recording model that assists both records managers and non-records staff, including line managers and personnel staff, to manage personnel records in support of corporate accountability and good governance. Production rules technique was employed to model the decision engine of the system. The implementation machines are configured with Windows 8 operating system, Java programming language and My Structured Query Language as the backend machine. The result showed that electronic activity record system is cheaper to run and yield better returns on personnel invetsment than the conventional method of record keeping

 

Publisher:
 Anale. Seria Informatic?. Vol. XIII Fasc. 2 – 2015 Annals. Computer Science Series, University Of Timisoara, Romania. 13(2):65-68.
Publication Type:
 Journal
Publication Title:
 A Data Encryption Standard (DES) Based Web Services Architecture
Publication Authors:
 9. Daodu M. N., Gabriel J. A., Alese B. K., Adetunmbi A. O.
Year Published:
 2015
Abstract:

Web Service Security (WSS) provides message level protection between two ends of clients and web services. This work proposes a WSS architecture whose security will be based on Data Encryption Standard (DES). It models a web service security based on DES, and evaluates the performance of the WSS using some standard metrics. To enable evaluation of the system, experiments were conducted in a Windows Vista Operating System environmentusing relevant tools. The evaluation result revealed that, deploying security alongside web services comes with additional overheads like Extra Central Processing Unit (XCPU)Time Cost for the message that is encrypted and to be transmitted, the server CPU Time to Process Request with Encryption (SCTPWE) increases along with the Request/Respond Time with Encryption (TRRWE), the Server CPU Time to Process Request with Encryption (SCTPWE) is greater than the Server CPU Time to Process Request without Encryption (SCTPWOE).

 

Publisher:
 The 2014 International Conference Of Information Security And Internet Engineering; World Congress On Engineering In UK, ISBN 978-988-19252-7-7; 505-509.
Publication Type:
 Conference
Publication Title:
 Modelling Of Risk Management Procedures For Cybercrime Control Systems
Publication Authors:
 Alese, B. K., Gabriel J. A., Olukayode O. And Daramola O. A.
Year Published:
 2014
Abstract:
This paper proposes formal models for Risk Management Procedures in cybercrime control systems. Mathematical techniques used stem from probability theory, set theory, statistics, and stochastic process theory. 
Publisher:
 Agboola A.H., Gabriel J.A., Aliu E., Alese B.K.
Publication Type:
 Journal
Publication Title:
 Development Of A Fuzzy Logic Based Rainfall Prediction Model. International Journal Of Engineering And Technology
Publication Authors:
 Agboola A.H., Gabriel J.A., Aliu E., Alese B.K.
Year Published:
 2013
Abstract:

The present study investigates the ability of fuzzy rules/logic in modelling rainfall for South Western Nigeria. The developed Fuzzy Logic model is made up of two functional components; the knowledge base and the fuzzy reasoning or decision-making unit. Two operations were performed on the Fuzzy Logic model; the fuzzification operation and defuzzification operation. The model predicted outputs were compared with the actual rainfall data. Simulation results reveal that predicted results are in good agreement with measured data. Prediction Error, Root Mean Square Error (RMSE), Mean Absolute Error (MAE) and the Prediction Accuracy were calculated, and on the basis of the results obtained, it can be suggested that fuzzy methodology is efficiently capable of handling scattered data. The developed fuzzy rule-based model shows flexibility and ability in modelling an ill-defined relationship between input and output variables.

 
Publisher:
 Adebayo O.T., Alese B.K., Gabriel A.J.
Publication Type:
 Journal
Publication Title:
 A Model For Computer Worm Detection In A Computer Network. International Journal Of Computer Applications
Publication Authors:
 Adebayo O.T., Alese B.K., Gabriel A. J.
Year Published:
 2013
Abstract:

This research presents a novel approach to detecting computer worms in Computer Networks by making use of detection based on the network behaviour through the collection of various parameters such as: network latency, throughput, bandwidth, response time, network utilization, packet loss and reliability. Infected hosts were tracked using an algorithm developed. Documentation of network measurements (behaviour) metrics for the purpose of detecting unknown worm infection using instance-based technique was achieved by taking note of the changes in the network parameters and their values were logged in the database, as worm propagated through the network. A model for calculating network performance characteristic was developed. Network Worm Simulator (NWS) was used to perform the scanning activities of worms on the network. Jpcap was used to capture network packet. In the database model, the Packets table store network packet captured, the time of capture and every packets stored is given a unique number as id. The network_metric table store the network parameter values for the packets identified by Packet_id related to the Packets table, each set of network parameter value is identified by a unique number called ID. The simulation of the model was implemented using Java programming language.

 
Publisher:
 International Conference For Internet Technology And Secured Transactions, The 8th International Conference For Internet Technology And Secured Transactions (ICITST-2013), Technically Co-sponsored By IEEE UK/RI Computer Chapter, 9th-12th December 2013, London, UK, Pp. 454-457.
Publication Type:
 Conference
Publication Title:
 Post-Quantum Crystography: A Combination Of Post-Quantum Cryptography And Steganography
Publication Authors:
 1. Gabriel J. A., Alese B. K., Adetunmbi A. O. And Adewale O. S
Year Published:
 2013
Abstract:
Crystography is the combination of Cryptography and Steganography for enhancing the security of communications over enterprise networks. Most existing Crystographic systems are based on Public key Cryptographic schemes like RSA and Elliptic Curve Cryptography (ECC), whose security depends on the difficulty of solving Integer Factorisation Problem (IFP) and Discrete Logarithm problem (DLP) respectively. However, techniques for solving IFP and DLP problems, improves continually. Therefore, the existence of Quantum Computers in the range of 1000 bits would be a real world threat to systems based on those problems. This paper thus propose a new Crystographic System that combines Post Quantum Cryptography with Steganography to ensure that security of communication is maintained both in Classical Computing era as well as Post-Quantum Computing era. 
Publisher:
 Alese B.K., Gabriel A. J., Adetunmbi A.O
Publication Type:
 Journal
Publication Title:
 Design And Implementation Of Internet Protocol Security Filtering Rules In A Network Environment. International Journal Of Computer Science And Information Security (IJCSIS), U.S.A. Vol. 9, No. 7. Pages 134-143.
Publication Authors:
 Alese B.K., Gabriel J.A., Adetunmbi A.O
Year Published:
 2011
Abstract:

Aircraft crashes are always accompanied with monumental loses. Other than the very high mortality rate involved, the grand scale destruction of property and the attendant socio-economic costs have made air crashes one of the most feared event in the world today. Guaranteeing a hundred percent safety during flight is impossible. We present, the design of an aircraft tracking system with a view to enhancing the effective tracking of aircrafts in flight, thereby ensuring air safety and preserving public trust and belief in the safety of air travel.

 
Publisher:
 Thompson A.F., Gabriel A.J., Alese B.K.
Publication Type:
 Journal
Publication Title:
 Design Of A Hybrid Aircraft Tracking System For Developing Countries. International Journal Of Computer And Organization Trends
Publication Authors:
 Thompson A.F., Gabriel A.J., Alese B.K.
Year Published:
 2011
Abstract:

nil